On Sun, 24 Jun 2012 13:34:45 -0500, Robert Simmons <rsimmo...@gmail.com> wrote:

In light of advanced in processors and GPUs, what is the potential for
duplication of RSA, DSA, and ECDSA keys at the current default key
lengths (2048, 1024, and 256 respectively)?


I've been able to duplicate keys for years simply using cp(1)

Define "duplicate". Are you asking about some sort of collision? Are you asking about brute forcing an encrypted stream and deducing what the private key is?
_______________________________________________
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"

Reply via email to